General
-
Target
main (4).bat
-
Size
17KB
-
Sample
241122-dh1zrayqhr
-
MD5
d2c79d02019fe6507207e4d57360c2d0
-
SHA1
58c6e205d730b3cdb1186d9c8618c891e6ddbcde
-
SHA256
900ec958cdc785121d2d7558256066e1189c709291245b4a1ffd4336ae2fc7b4
-
SHA512
20b38b3b3827c23df5a7c0fdce51524c6f4dc2192b139abef8156f69a25b263f1c5ce502cbd328a056d01396e83a6338e836a55f46a15ce7567313ad82549610
-
SSDEEP
192:p3U9MgR/KWzBkRIKxZnB2Gl/631wAZ/vhAaiU74/s7HKwSRBPJyU4dWfehLp/rh:C9Mk/p9kRIVHrEsvSRBPJy7Wfezh
Static task
static1
Malware Config
Extracted
quasar
1.4.1
bot
wooting2000-47095.portmap.host:47095
2e05f1ef-743b-4020-b18a-7f4276517e8b
-
encryption_key
E83D6FC31962786DAEA703F111D2381786DF06CA
-
install_name
Modification1.5.14.12.exe
-
log_directory
Logs
-
reconnect_delay
3126
-
startup_key
explorer.dll
-
subdirectory
SubDir
Targets
-
-
Target
main (4).bat
-
Size
17KB
-
MD5
d2c79d02019fe6507207e4d57360c2d0
-
SHA1
58c6e205d730b3cdb1186d9c8618c891e6ddbcde
-
SHA256
900ec958cdc785121d2d7558256066e1189c709291245b4a1ffd4336ae2fc7b4
-
SHA512
20b38b3b3827c23df5a7c0fdce51524c6f4dc2192b139abef8156f69a25b263f1c5ce502cbd328a056d01396e83a6338e836a55f46a15ce7567313ad82549610
-
SSDEEP
192:p3U9MgR/KWzBkRIKxZnB2Gl/631wAZ/vhAaiU74/s7HKwSRBPJyU4dWfehLp/rh:C9Mk/p9kRIVHrEsvSRBPJy7Wfezh
-
Quasar family
-
Quasar payload
-
Blocklisted process makes network request
-
Executes dropped EXE
-
Legitimate hosting services abused for malware hosting/C2
-
Drops file in System32 directory
-